Chapter 14 Simulation and Other Applications. 2 What Is Simulation? Simulation A model of a complex system and the experimental manipulation of the model.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Chapter 14 Simulation. 2 What Is Simulation?  Simulation: A model of a complex system and the experimental manipulation of the model to observe the results.
Final topics: Scheduling Recap and some advanced topics.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 12Slide 1 Software Design l Objectives To explain how a software design may be represented.
Modeling & Simulation. System Models and Simulation Framework for Modeling and Simulation The framework defines the entities and their Relationships that.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 14 Simulation and Other Applications Chapter Goals Define simulation Give examples of complex systems Distinguish between continuous and.
Chapter 14 Simulation and Other Applications Nell Dale John Lewis.
Simulation Waiting Line. 2 Introduction Definition (informal) A model is a simplified description of an entity (an object, a system of objects) such that.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats and Attacks Principles of Information Security, 2nd Edition
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Chapter 12 Information Systems. 2 Chapter Goals Define the role of general information systems Explain how spreadsheets are organized Create spreadsheets.
Chapter 12: Simulation and Modeling Invitation to Computer Science, Java Version, Third Edition.
Marjie Rodrigues
Chapter 14 Simulation, Graphics and Other Applications.
Chapter 14 Simulation. 2 What Is Simulation?  Simulation: A model of a complex system and the experimental manipulation of the model to observe the results.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Authentication Approaches over Internet Jia Li
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Chapter 14 Simulation, Graphics, Gaming and Other Applications.
Chapter 12: Simulation and Modeling
Chapter 14 Simulation and Other Applications. 2 Chapter Goals Define simulation Give examples of complex systems Distinguish between continuous and discrete.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Chapter 14 Simulation, Graphics and Other Applications.
Chapter 14: Simulation, Graphics, and Other Applications Chapter 14 Simulation, Graphics, and Other Applications Page 148 In order to gain insight into.
Chapter 17 Computer Security. Chapter Goals Discuss the CIA triad List three types of authentication credentials Create secure passwords and assess the.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Chapter 14 Simulation, Graphics and Other Applications.
BUSINESS B1 Information Security.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
Viruses & Destructive Programs
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Chapters: 10, 12, 13, 14, 15, 16 Final Review 1. Chapter 10 Operating Systems.
Operating system Security By Murtaza K. Madraswala.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
A model is… a representation of a planned or existing object.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Subject Name: Computer Graphics Subject Code: Textbook: “Computer Graphics”, C Version By Hearn and Baker Credits: 6 1.
Chapter 12 Information Systems. 2 Chapter Goals Define the role of general information systems Explain how spreadsheets are organized Create spreadsheets.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
OPERATING SYSTEMS CS 3530 Summer 2014 Systems and Models Chapter 03.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Advantages of simulation 1. New policies, operating procedures, information flows and son on can be explored without disrupting ongoing operation of the.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
 Simulation enables the study of complex system.  Simulation is a good approach when analytic study of a system is not possible or very complex.  Informational,
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
SECURITY Prepared By: Dr. Vipul Vekariya.. 2 S ECURITY Secure system will control, through use of specific futures, access to information that only properly.
Chapter 12: Simulation and Modeling
BUSINESS DRIVEN TECHNOLOGY
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
OPERATING SYSTEMS CS 3502 Fall 2017
IT Security  .
Modeling and Simulation (An Introduction)
Operating system Security
Resource Management Chapter 19 9/20/2018 Crowley OS Chap. 19.
Bioinformatics how to …
Chapter 17 Computer Security.
UNIT 18 Data Security 1.
Chapter 12 Information Systems.
Simulation, Graphics and Other Applications
Chapter Goals Discuss the CIA triad
Presentation transcript:

Chapter 14 Simulation and Other Applications

2 What Is Simulation? Simulation A model of a complex system and the experimental manipulation of the model to observe the results Systems that are best suited to being simulated are dynamic, interactive, and complicated Model An abstraction of a real system It is a representation of the objects within the system and the rules that govern the interactions of the objects

3 Constructing Models Continuous simulation –Treats time as continuous –Expresses changes in terms of a set of differential equations that reflect the relationships among the set of characteristics –Meteorological models falls into this category

4 Constructing Models Discrete event simulation Made up of entities, attributes, and events –Entity The representation of some object in the real system that must be explicitly defined –Attribute Some characteristic of a particular entity –Event An interaction between entities

5 Queuing Systems Queuing system A discrete-event model that uses random numbers to represent the arrival and duration of events The system is made up of –servers –queues of objects to be served Please wait!

6 Queuing Systems To construct a queuing model, we must know –The number of events and how they affect the system in order to determine the rules of entity interaction –The number of servers –The distribution of arrival times in order to determine if an entity enters the system –The expected service time in order to determine the duration of an event

7 Meteorological Models Meteorological models Models based on the time-dependent partial differential equations of fluid mechanics and thermodynamics Initial values for the variables are entered from observation, and the equations are solved to define the values of the variables at some later time

8 Meteorological Models

9 Computer models are designed to aid the weathercaster, not replace him or her –The outputs from the computer models are predictions of the values of variables in the future –It is up to the weathercaster to determine what the values mean

10 Meteorological Models Relocatable models Models applied to a moving target Can you think of an example? What is special about weather models?

11 Hurricane Tracking Figure 14.2 Improvements in hurricane models (GFDL) Geophysical and Fluid Dynamics Laboratory

12 Graphics Originally the language of communications for engineers, designers, and architects Computer-aided design (CAD) A system that uses computers with advanced graphics hardware and software to create precision drawings or technical illustrations

13 Graphics Figure 14.3 Geometric modeling techniques

14 Graphics Shape and surface influence an object’s appearance Equations used to describe planes, spheres, and cylinders Real world surfaces are rough, which scatter light differently, requiring texture mapping techniques

15 Graphics Illumination model Simulation of light interaction at one point on an object Shading model (shading) Process of using an illumination model to determine the appearance of an entire object Rendering The process of creating an entire image

16 Modeling Complex Objects Figure 14.5 A natural computer generated landscape

17 Modeling Complex Objects Figure 14.6 Midpoint subdivision for creating fractal terrains

18 Modeling Complex Objects Figure 14.7 Water pouring into a glass

19 Modeling Complex Objects Figure 14.8 Cellular automata-based clouds

20 Modeling Complex Objects Figure 14.9 A campfire

21 Modeling Complex Objects Figure A simulation of cloth showing ending and draping

22 Modeling Complex Objects What is the most difficult object to model?

23 Embedded Systems Embedded systems Computers that are dedicated to perform a narrow range of functions as part of a larger system Empty your pockets or backpacks. How many embedded systems do you have?

24 E-Commerce Electronic commerce The process of buying and selling products and services using the WEB Can you name at least 3 e-commerce sites that you have visited lately? What made e-commerce feasible and easy? What problems does e-commerce face?

25 Computer Security Authentication credentials Information users provide to identify themselves for computer access User knowledge name, password, PIN Smart card card with embedded memory chip used for identification Biometrics human characteristics such as fingerprints, retina or voice patterns

26 Computer Security Malicious Code A computer program that attempts to bypass appropriate authorization and/or perform unauthorized functions Worm stand alone, targets network resources Trojan horse disguised as benevolent resource Virus self-replicating Logic bomb set up to execute at system event

27 Computer Security Security Attacks An attack on the computer system itself Password guessing obvious Phishing trick users into revealing security information Spoofing malicious user masquerades as authorized user Back door unauthorized access to anyone who knows it exists

28 Computer Security Buffer overflow defect that could cause a system to crash and leave the user with heightened privileges Denial-of-service attack that prevents authorized user from accessing the system Man-in-the-middle network communication is intercepted in an attempt to obtain key data Have you ever experienced one of these?